Course Outline
- Explaining the Importance of Security Controls and Security Intelligence:
- Utilizing Threat Data and Intelligence:
- Analyzing Security Monitoring Data:
- Collecting and Querying Security Monitoring Data
- Utilizing Digital Forensics and Indicator Analysis Techniques:
- Applying Incident Response Procedures:
- Applying Risk Mitigation and Security Frameworks:
- Performing Vulnerability Management:
- Applying Security Solutions for Infrastructure Management:
- Understanding Data Privacy and Protection
- Applying Security Solutions for Software Assurance
- Applying Security Solutions for Cloud and Automation:
Requirements
Recommended Network+, Security+ or equivalent knowledge. Minimum of 4 years of hands-on experience in technical cybersecurity role
Testimonials (5)
Explaining in detail regarding RHDS.
Murat Kumburlu - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
I learned a lot and gained knowledge can use at my work!
Artur - Akademia Lomzynska
Course - Active Directory for Admins
The scope of knowledge that was covered. Certainly, not everything could be explained in detail, but this is probably a matter of time. The training lasts 3 days. Over these 3 days, various topics were discussed, which can be explored further after the training. The training is definitely a plus. A lot of knowledge and issues presented in an organized form.
Pawel Sitarz - Icotera sp. z o.o.
Course - C/C++ Secure Coding
Machine Translated
It opens up a lot and gives lots of insight what security
Nolbabalo Tshotsho - Vodacom SA
Course - Advanced Java Security
This topic is better with F2F, but this online training is still handled well . The important thing is the trainees were able to have understanding of Hyperledger Indy